Module One
Module One
Attacks
Common Threats
1.1.1 Threat Domains
With organizations facing an ever-growing number of cyber threats, it is critical
that they have robust security solutions in place. But in order to protect
themselves, organizations first need to know what vulnerabilities exist within
their threat domains. A ‘threat domain’ is considered to be an area of control,
authority or protection that attackers can exploit to gain access to a system.
There are many ways that attackers can uncover vulnerabilities and exploit
systems within a domain.
1.1.3 Avatar
Remember that cybercriminals repertory is vast and ever-evolving. Sometimes,
they might combine two or more of the above tactics to increase their chances.
It is up to cybersecurity professionals to raise awareness and educate other
people in an organization about these tactics, to prevent them from falling
victim to such attacks.
1.1.7 Avatar
Cyber threats can spread in various ways such as through users themselves,
via devices connected to the network or via services hosted on a public or
private cloud. And don’t forget the threat of a physical attack if the right
security measures are not in place.
Let’s take a look at these in more detail.
1.1.13 Avatar
While public cloud service providers do implement security controls to protect
the cloud environment, organizations are responsible for protecting their own
resources on the cloud. Therefore, some of the most common threats to the
public cloud domain include:
Data breaches.
Loss or theft of intellectual property.
Compromised credentials or account hijacking.
Social engineering attacks.
Compliance violation.
1.1.18 Avatar
Many organizations rely on threat intelligence data to help them understand
their overall risk, so that they can formulate and put in place effective
preventative and response measures.
Some of this data is closed source and requires a paid subscription for access.
Other data is considered open source intelligence (OSINT) and can be accessed
from publicly available information sources. In fact, sharing threat intelligence
data is becoming more popular, with governments, universities, healthcare
sector organizations and private businesses working together to improve
everyone’s security.
1.2 Deception
1.2.1 Social Engineering
Social engineering is a non-technical strategy that attempts to manipulate
individuals into performing certain actions or divulging confidential information.
Rather than software or hardware vulnerabilities, social engineering exploits
human nature, taking advantage of people’s willingness to help or preying on
their weaknesses, such as greed or vanity.
Select the arrows to find out more about some common types of social
engineering attacks.
Pretexting
This type of attack occurs when an individual lies to gain access to privileged
data. For example, an attacker pretends to need personal or financial data in
order to confirm a person’s identity.
Something for something (quid pro quo)
Quid pro quo attacks involve a request for personal information in exchange for
something, like a gift. For example, a malicious email could ask you to give
your sensitive personal details in exchange for a free vacation.
Identity fraud
This is the use of a person’s stolen identity to obtain goods or services by
deception. For example, someone has acquired your data and is attempting to
issue a credit card in your name.
1.2.3 Avatar
Remember that cybercriminals repertory is vast and ever-evolving. Sometimes,
they might combine two or more of the above tactics to increase their chances.
It is up to cybersecurity professionals to raise awareness and educate other
people in an organization about these tactics, to prevent them from falling
victim to such attacks.
1.2.5 Avatar
Most cyber attacks involve some form of deception. Let’s take a look at some of
these.
Introduction
Required Resources
Background / Scenario
Recent research reveals that the most common types of cyberattacks are becoming more
sophisticated, and the attack targets are growing. The purpose of an attack is to steal
information, disable systems or critical services, disrupt systems, activities, and operations.
Some attacks are designed to destroy information or information systems, maliciously
control a computing environment or its infrastructure, or destroy the integrity of data and/or
information systems. One of the most effective ways an attacker can gain access to an
organization’s network is through simple deception. In the cybersecurity world this is call
social engineering.
Social engineering attacks are very effective because people want to trust other people and
social engineering attacks are not the kind of attack that the average user guards against;
users are concerned with botnets, identity theft or ransomware. These are big external
threats, so they do not think to question what seems to be a legitimate-looking message.
Baiting
Baiting relies on the curiosity or greed of the victim. What distinguishes baiting from other
types of social engineering is the promise of an item or good that hackers use to entice
victims. Baiters may offer users free music or movie downloads if the users surrender their
login credentials to a certain site. Baiting attacks are not restricted to online schemes.
Attackers can exploit human curiosity with physical media like USB drives.
Shoulder Surfing
Shoulder surfing is literally looking over someone's shoulder to get information. Shoulder
surfing is an effective way to get information in crowded places because it is relatively easy
to stand next to someone and watch as they fill out a form or enter a PIN number at an
ATM machine. Shoulder surfing can also be done long distance with the aid of modern cell
phones, binoculars, or other vision-enhancing devices. To prevent shoulder surfing, experts
recommend that you shield paperwork or your keypad from view by using your body or
cupping your hand. There are even screen shields that make shoulder surfing much more
difficult.
Pretexting
In phishing attacks, the attackers try to obtain personal information or data, like username,
password, and credit card details, by disguising themselves as trustworthy entities. Phishing
is mainly conducted through emails and phone calls. Spear phishing is more targeted
version of the phishing in which an attacker chooses specific individuals or enterprises and
then customizes their phishing attack to their victims to make it less conspicuous. Whaling
is when the specific target is a high-profile employee such as a CEO or CFO.
Ransomware attacks involve injecting malware that encrypts a victim’s critical data. The
cyber criminals request a ransom to be paid to decrypt the data. However, even if a ransom
is paid, there is no guarantee the cyber criminals will decrypt the information. Ransomware
is one of the fastest growing types of cyberattack and has affected thousands of financial
organizations, government agencies, healthcare facilities, even schools and our education
systems.
Scareware takes advantage of a user’s fear by coaxing them into installing fake antivirus
software.
Tailgating
Tailgating tricks the victim into helping the attacker gain unauthorized access into the
organization’s physical facilities. The attacker seeks entry into a restricted area where
access is controlled by software-based electronic devices or human guards. Tailgating can
also involve the attacker following an employee closely to pass through a locked door
before the door locks behind the employee.
Dumpster diving
In the world of social engineering, dumpster diving is a technique used to retrieve discarded
information thrown in the trash to carry out an attack on a person or organization. Dumpster
diving is not limited to searching through the trash for obvious treasures like access codes
or passwords written down on sticky notes, it can also involve electronic information left
on desktops, or stored on USB drives.
The National Support Center for Systems Security and Information Assurance (CSSIA)
hosts a Social Engineering Interactive activity. The current link to the site
is https://www.cssia.org/social_engineering/. However, if the link changes, try searching
for #CSSIA Social Engineering Interactive#.
Click Next in the interactive activity, and then use the content to answer the following
questions.
What is baiting? Did you click on the USB drive? What happened to the victim’s system?
Answer Area
Show Answer
What is Shoulder Surfing? What device was used to perform the shoulder surfing? What
information was gained?
Answer Area
Show Answer
What is Pretexting? What type of information did the cybercriminal request? Would you
fall victim?
Answer Area
Show Answer
In this phishing example, what is the ploy the attacker uses to trick the victim to visit the
trap website? What is the trap website used for?
Answer Area
Show Answer
Answer Area
Show Answer
Scareware is when victims are deceived into thinking that their system is infected with
malware and receive false alarms prompting them to install software that is not needed or is
itself malware. Ransomware is a type of malware that threatens to publish the victim's data
or encrypts the victim’s data preventing access or the ability to use the data.
Victims are prevented from accessing their system or personal files until they make a
ransom payment to regain access.
What data does the attacker claim to have in this example? Would you fall for this
deception?
Answer Area
Show Answer
What is the attacker requesting the victim do to get the data back?
Answer Area
Show Answer
What is tailgating?
Answer Area
Show Answer
Answer Area
Show Answer
Use PowerPoint to create a poster that will make others aware of the different
social engineering techniques used to gain unauthorized access to an organization
or the organization’s data.
The poster should depict the techniques used and how users can avoid one of
these social engineering attacks. Also include directions on where the poster
should be placed within the organization.
Unlike viruses, Trojans do not self-replicate but often bind themselves to non-
executable files, such as image, audio or video files, acting as a decoy to harm
the systems of unsuspecting users.
1.3.3 Ransomware
This malware is designed to hold a computer system or the data it contains
captive until a payment is made.
Ransomware usually works by encrypting your data so that you cannot access
it. According to ransomware claims, once the ransom is paid via an untraceable
payment system, the cybercriminal will supply a program that decrypts the
files or send an unlock code — but in reality, many victims do not gain access
to their data even after they have paid.
Some versions of ransomware can take advantage of specific system
vulnerabilities to lock it down. Ransomware is often spread through phishing
emails that encourage you to download a malicious attachment, or through a
software vulnerability.
1.3.5 Avatar
Distributed denial of service (DDoS) attacks are similar but originate from
multiple coordinated sources. Here is how this happens:
1. An attacker builds a network (botnet) of infected hosts called zombies,
which are controlled by handler systems.
2. The zombie computers constantly scan and infect more hosts, creating
more and more zombies.
3. When ready, the hacker will instruct the handler systems to make the
botnet of zombies carry out a DDoS attack.
MAC Flooding
Devices on a network are connected via a network switch by using packet
switching to receive and forward data to the destination device. MAC flooding
compromises the data transmitted to a device. An attacker floods the network
with fake MAC addresses, compromising the security of the network switch.
1.3.10 Avatar
A replay attack occurs when an attacker captures communication between two
hosts and then retransmits the message to the recipient, to trick the recipient
into doing what the attacker wants, thus circumventing any authentication
mechanisms.
1.3.13 Avatar
It is important to note that keylogging software can be legitimate. Many
parents use it to keep an eye on their children’s internet behavior.
1.3.15 Defending Against Attacks
Organizations can take several steps to defend against various attacks. These
include the following:
Configure firewalls to remove any packets from outside the network that
have addresses indicating that they originated from inside the network.
Ensure patches and upgrades are current.
Distribute the workload across server systems.
Network devices use Internet Control Message Protocol (ICMP) packets to
send error and control messages, such as whether or not a device can
communicate with another on the network. To prevent DoS and DDoS
attacks, organizations can block external ICMP packets with their
firewalls.
An evil twin attack describes a situation where the attacker’s access point is set up to look
like a better connection option. Once you connect to the evil access point, the attacker can
analyze your network traffic and execute MitM attacks.
Attackers can take advantage of this fact by deliberately jamming the transmission of a
radio or satellite station to prevent a wireless signal from reaching the receiving station.
In order to successfully jam the signal, the frequency, modulation and power of the RF
jammer needs to be equal to that of the device that the attacker is seeking to disrupt.
1.4.5 Avatar
You have probably heard of Bluetooth but do you know exactly what it is and how it
works?
Due to the limited range of Bluetooth, an attacker must be within range of their target. Here
are some ways that they can exploit a target’s device without their knowledge.
Bluesnarfing occurs when an attacker copies information, such as emails and contact lists,
from a target his device using Bluetooth connection.
Wired equivalent privacy (WEP) and Wi-Fi protected access (WPA) are security protocols
that were designed to secure wireless networks that are vulnerable to attacks.
WEP was developed to provide data transmitted over a wireless local area network
(WLAN) with a level of protection comparable to what is usually expected of a traditional
wired network. It added security to wireless networks by encrypting the data.
WEP used a key for encryption. The problem, however, was that WEP had no provision for
key management and so the number of people sharing the same key continually grew,
giving criminals access to a large amount of traffic data. Furthermore, WEP’s initialization
vector (IV), one of the key components of its encryption key, was too small, readable and
static.
To address this and replace WEP, WPA and then WPA2 were developed as improved
security protocols. Unlike with WEP, an attacker cannot recover WPA2’s encryption key
by observing network traffic. However, they can still use a packet sniffer to analyze the
packets going between an access point and a legitimate user.
1.5.1 Avatar
Attacks carried out through web applications are becoming increasingly common.
Cross-site scripting (XSS) is a common vulnerability found in many web applications. This
is how it works:
Most modern websites use a database, such as a Structured Query Language (SQL) or an
Extensible Markup Language (XML) database, to store and manage data. Injection attacks
seek to exploit weaknesses in these databases.
An XML injection attack can corrupt the data on the XML database and threaten the
security of the website.
Cybercriminals can manipulate this query by programming it to suit their needs. This will
grant them access to all of the sensitive information stored on the database and allows them
to make any number of changes to the website.
Cybercriminals can carry out an SQL injection attack on websites or any SQL database by
inserting a malicious SQL statement in an entry field.
This attack takes advantage of a vulnerability in which the application does not correctly
filter the data entered by a user for characters in an SQL statement.
As a result, the cybercriminal can gain unauthorized access to information stored on the
database, from which they can spoof an identity, modify existing data, destroy data or even
become an administrator of the database server itself.
DLL injection attack
A dynamic link library (DLL) file is a library that contains a set of code and data for
carrying out a particular activity in Windows. Applications use this type of file to add
functionality that is not built-in, when they need to carry out this activity.
DLL injection allows a cybercriminal to trick an application into calling a malicious DLL
file, which executes as part of the target process.
The Lightweight Directory Access Protocol (LDAP) is an open protocol for authenticating
user access to directory services.
Buffers are memory areas allocated to an application. A buffer overflow occurs when data
is written beyond the limits of a buffer. By changing data beyond the boundaries of a
buffer, the application can access memory allocated to other processes. This can lead to a
system crash or data compromise, or provide escalation of privileges.
These memory flaws can also give attackers complete control over a target’s device. For
example, an attacker can change the instructions of a vulnerable application while the
program is loading in memory and, as a result, can install malware and access the internal
network from the infected device.
1.5.5 Avatar
Did you know that research carried out by Carnegie Mellon University estimates that nearly
half of all exploits of computer programs stem from some form of buffer overflow?
Metasploit
The Metasploit Project is a computer security project that provides information about
security vulnerabilities and aids penetration testing. Among the tools they have developed
is the Metasploit Framework, which can be used for developing and executing exploit code
against a remote target.
Meterpreter, in particular, is a payload within Metasploit that allows users to take control of
a target his device by writing their own extensions and uploading these files into a running
process on the device. These files are loaded and executed from memory, so they never
involve the hard drive. This means that such files fly under the radar of antivirus detection.
Meterpeter also has a module for controlling a remote system his webcam. Once
Meterpreter is installed on a target device, the Metasploit user can view and capture images
form the target his webcam.
Every piece of information that an attacker receives about a targeted system or application
can be used as a valuable weapon for launching a dangerous attack.
CSRF describes the malicious exploit of a website where unauthorized commands are
submitted from a user’s browser to a trusted web application.
A malicious website can transmit such commands through specially-crafted image tags,
hidden forms or JavaScript requests — all of which can work without the user’s
knowledge.
Also known as a time of check (TOC) or a time of use (TOU) attack, a race condition
attack happens when a computing system that is designed to handle tasks in a specific
sequence is forced to perform two or more operations simultaneously.
For example, operating systems are made up of threads — the smallest sequence of
program instructions required to carry out a process. When two or more threads access
shared data and try to change it at the exact same time, a race condition attack occurs.
Attackers can use error messages to extract specific information such as the hostnames of
internal systems and directories or files that exist on a given web server — as well as
database, table and field names that can be used to craft SQL injection attacks.
An API delivers a user response to a system and sends the system’s response back to the
user. An API attack occurs when a cybercriminal abuses an API endpoint.
Replay attack
Directory traversal occurs when an attacker is able to read files on the webserver outside of
the directory of the website. An attacker can then use this information to download server
configuration files containing sensitive information, potentially expose more server
vulnerabilities or even take control of the server!
These attacks are computer security exploits that crash, hang or otherwise interfere with a
targeted program or system. Rather than overwhelming network bandwidth like a DoS
attack, resource exhaustion attacks overwhelm the hardware resources available on the
target’s server instead.
There are several actions that you can take to defend against an application attack. You will
find some of them outlined here.
The first line of defense against an application attack is to write solid code.
Prudent programming practice involves treating and validating all input from
outside of a function as if it is hostile.
Keep all software, including operating systems and applications, up to date and do
not ignore update prompts. Remember that not all programs update automatically.
1.5.10 Avatar
Email is used by billions of people worldwide and, as a result, has become a major
vulnerability to users and organizations.
1.5.11 Spam
Spam, also known as junk mail, is simply unsolicited email. In most cases, it is a method of
advertising. However, a lot of spam is sent in bulk by computers infected by viruses or
worms — and often contains malicious links, malware or deceptive content that aims to
trick recipients into disclosing sensitive information, such as a social security number or
bank account information.
Almost all email providers filter spam, but it still consumes bandwidth. And even if you
have security features implemented, some spam might still get through to you. Look out for
the following indicators of spam:
If you receive an email that contains one or more of these indicators, you should not open
the email or any attachments. Many organizations have an email policy that requires
employees to report receipt of this type of email to their cybersecurity team for further
investigation. If in doubt, always report.
1.5.12 Phishing
Phishing occurs when a user is contacted by email or instant message or in any other way
by someone masquerading as a legitimate person or organization. The intent is to trick the
recipient into installing malware on their device or into sharing personal information, such
as login credentials or financial information.
For example, you receive an email congratulating you for winning a prize. It looks like it
was sent from a well-known retail store and asks you to click on a link to claim tyour prize.
This link may in fact redirect you to a fake site that asks you to enter your personal details,
or it may even install a virus on your device.
Spear phishing
A highly targeted attack, spear pishing sends customized emails to a specific person based
on information the attacker knows about them, which could be their interest, preferences,
activities and work projects.
For example, a cybercriminal discovers through their research that you are looking to buy a
specific model of car. The cybercriminal joins a car discussion forum you are a member of,
forges a car sale offering and sends you an email that contains a link to see pictures of the
car. When you click on the link, you unknowingly install malware on your device.
Criminals make use of a wide range of techniques to try to gain access to your personal
information.
Vishing
Often referred to as voice phishing, this type of attack sees criminals use voice
communication technology to encourage users to divulge information, such as their credit
card details.
Criminals can spoof phone calls using voice over internet protocol (VoIP), or leave
recorded messages to give the impression that they are legitimate callers.
Pharming
This type of attack deliberately misdirects users to a fake version of an official website.
Tricked into believing that they are connected to a legitimate site, users enter their
credentials into the fraudulent website.
Whaling
Whaling is a phishing attack that targets high profile individuals, such as senior executives
within an organization, politicians and celebrities.
There are many actions that you can take to defend against email and browser attacks.
Some of the most important ones are outlined here.
It is difficult to stop spam, but there are ways to reduce its effects:
Most Internet service providers (ISPs) filter spam before it reaches the user’s inbox.
Many antivirus and email software programs automatically detect and remove
dangerous spam from an email inbox.
Organizations should educate employees about the dangers of unsolicited emails
and make them aware of the dangers of opening attachments.
Never assume that email attachments are safe, even when they come from a trusted
contact. Always scan attachments before opening them.
All software should be kept up-to-date, with the latest security patches applied to protect
against any known security vulnerabilities.
1.5.16 Avatar
Phew! That’s a lot to take in. Cybercriminals can employ a range of tactics to get the
information they want. And we’re not done yet!
Physical attacks
Physical attacks are intentional, offensive actions used to destroy, expose, alter, disable,
steal or gain unauthorized access to an organization’s infrastructure or hardware.
Loading malware onto a USB flash drive that infects a device when plugged in.
Fitting cables and plugs such as generic USB cables, mobile device charging cables
and wall or power adapters with advanced technologies, such as a wireless chip, to
allow an attacker to control or provide instructions to a device.
Copying or skimming data from a credit or debit card using a specialized terminal to
create a cloned card, which can be used to gain unauthorized access to the victim’s
accounts.
Machine learning is a method of automation that allows devices to carry out analysis and
perform tasks without specifically being programmed to do so. It powers many of the
applications we use today, such as web searching, photo tagging, spam detection, video
surveillance, fraud detection and security automation.
Machine learning uses mathematical models to predict outcomes. However, these models
are dependent on the data that is inputted. If the data is tainted, it can have a negative
impact on the predicted outcome. Attackers can take advantage of this to perpetrate attacks
against machine learning algorithms. For example, using tainted data to trick an
autonomous vehicle into misinterpreting street signs.
Supply chain attacks
Many organizations interface with a third party for their systems management or to
purchase components and software. Organizations may even rely on parts or components
from a foreign source.
Attackers often find ways to intercept these supply chains. For example, software can be
based on specific support agreements and subject to an end-of-life (EOL) date. Changing
this date could mean that an organization is no longer eligible for service and maintenance
support.
Cloud-based attacks
Rather than developing systems on their own premises, more and more organizations are
making the move toward cloud-based computing, as we discussed earlier in this module.
The advantage is that the cloud provider will maintain the equipment but this also opens up
an organization to a host of potential threats. Attackers are constantly leveraging ways to
exploit sensitive data stored on the cloud, as well as applications, platforms and
infrastructure that is cloud-based, as we saw with SaaS, PaaS and IaaS.
Threat Domains
A threat domain is an area of control, authority, or protection that attackers can exploit to
gain access to a system. Cyber threat categories include software attacks and errors,
sabotage, human error, theft, hardware failures, utility interruption, and natural disasters.
Internal threats are usually carried out by current or former employees and other contract
partners. The source of an external threat typically stems from amateur or skilled attackers
who can exploit vulnerabilities in networked devices, or use social engineering techniques.
A user domain includes anyone with access to an organization’s information system.
Common user threats include poorly enforced security policies, data theft, unauthorized
downloads and media, unauthorized VPNs and websites, and destruction of systems,
applications, or data. Individual devices, LANs and private and public clouds are also
vulnerable to attack. There are complex threats such as an APT and an algorithm attack.
Cybercriminals use backdoor programs to gain unauthorized access to a system by
bypassing the normal authentication procedures. Backdoors grant cybercriminals continued
access to a system, even if the organization has fixed the original vulnerability used to
attack the system. Most rootkits exploit software vulnerabilities to gain access to resources
and modify system files. Rootkits can also modify system forensics and monitoring tools,
making them very hard to detect.
The dark web is encrypted web content that is not indexed by conventional search engines
and requires specific software, authorization, or configurations to access. IOCs such as
malware signatures or domain names provide evidence of security breaches. AIS enables
the real-time exchange of cybersecurity threat indicators using standardized and structured
languages called STIX and TAXII.
Deception
Organizations need to promote awareness of social engineering tactics and properly educate
employees on prevention measures.
Cyber Attacks
Malware is any code that can be used to steal data, bypass access controls, cause harm to or
compromise a system. A virus is a type of computer program that, when executed,
replicates, and attaches itself to other files by inserting its own code into it. A worm is a
malicious software program that replicates by independently exploiting vulnerabilities in
networks. A Trojan horse is malware that carries out malicious operations by masking its
true intent. A logic bomb is a malicious program that waits for a trigger to set off the
malicious code. Ransomware is designed to hold a computer system or the data it contains
captive until a payment is made. DoS attacks work by creating an overwhelming quantity
of traffic or by sending maliciously formatted packets that cannot be identified by an
application, causing the receiving device to run slowly or crash. DDoS attacks are similar
but originate from multiple coordinated sources. DNS attacks include spoofing and
hijacking.
Layer 2 attacks include MAC address, ARP and IP spoofing, MAC flooding, man-in-the-
middle, and man-in-the-mobile. Zero-Day attacks exploit software vulnerabilities before
they become known. Keyboard logging (keylogging) logs keystrokes and configures the
keylogger software to send the log file to the criminal. This log file can reveal usernames,
passwords, websites visited, etc.
To defend against these attacks use firewalls, stay current on upgrades and patches,
distribute the workload across server systems, and block external ICMP packets with
firewalls.
To defend against wireless and mobile device attacks: change default configurations.
Restrict access point placement by placing these devices outside the firewall or in a DMZ.
Use WLAN tools to detect rogue access points or unauthorized workstations. Have a policy
for guest access to a Wi-Fi network. Employees should use a remote access VPN for
WLAN access.
XSS is a vulnerability found in many web applications. Types of Code Injection attacks
include XML, SQL, DLL, and LDAP. A buffer overflow occurs when data is written
beyond the limits of a buffer. Remote code execution is exploiting application
vulnerabilities to execute any command with the privileges of the authorized user. Other
application attacks include CSRF, race condition, improper input handling, error handling,
API, replay, directory traversal, and resource exhaustion.
Write solid code to defend against an application attack. Treat and validate all input from
outside of a function as if it is hostile. Keep all software up to date. Spam is unsolicited
email that is usually a method of advertising. Some spam is sent in bulk by computers
infected with viruses or worms. Phishing is when a user is contacted using email or instant
message by a threat actor masquerading as a legitimate person. Spear phishing sends
customized emails to a specific person based on information the attacker knows about
them. Other common scams include vishing, pharming, and whaling. Other types of attacks
include physical attacks to equipment, adversarial AI attacks, supply chain attacks and
cloud-based attacks.
Use antivirus software to defend against email and browser attacks. Never assume that
email attachments are safe. Always scan attachments before opening them. Become a
member of the Anti-Phishing Working Group (APWG). All software should be kept up-to-
date.